Nmap concepts Flashcards

(20 cards)

1
Q

Nmap Scripting Engine (NSE)

A

Runs Lua scripts for vuln detection, brute force, malware discovery, and automation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

-sV

A

Service discovery scan to identify applications and versions on open ports.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

-O

A

OS fingerprinting using TCP/IP stack behavior.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

-A

A

Aggressive mode. Runs OS detection, version detection, NSE scripts, and traceroute.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

-sS vs -sT

A

SYN scan is stealthier (half-open). TCP connect scan is noisier but works without root/admin.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

-sN / -sF / -sX

A

Null, FIN, and Xmas scans send unusual flag combos to infer port states.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Idle Scan (-sI)

A

Uses a third-party ‘zombie’ host for stealth scanning, hiding attacker’s IP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

-PE / -PS / -PA / -PU / -PR

A

Different host discovery methods: ICMP, TCP SYN, TCP ACK, UDP, and ARP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

-Pn

A

Treat all hosts as up. Skips host discovery stage; used when ICMP is blocked.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

-p

A

Port specification: choose individual ports or ranges, e.g., -p 80,443 or -p 1-1000.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

–top-ports <n></n>

A

Scans the most commonly used <n> ports instead of all 65,535.</n>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

–exclude <targets></targets>

A

Excludes specific hosts/subnets from the scan.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

-T0–T5

A

Timing templates: 0=paranoid (slow, stealth), 5=insane (fast, noisy).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

-f / –mtu

A

Fragment packets to evade detection by firewalls/IDS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

-oN / -oX / -oG / -oA

A

Output formats: normal, XML, grepable, or all three at once.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Scenario: Scan only the top 100 ports

A

Use –top-ports 100.

17
Q

Scenario: Evade IDS by slowing probes

A

Use –scan-delay or -T0/-T1.

18
Q

Scenario: Need scan results for a report and XML parser

A

Use -oA results (creates .nmap, .xml, .gnmap).

19
Q

Scenario: ICMP blocked but need discovery

A

Use -PS (TCP SYN) or -PA (TCP ACK).

20
Q

Scenario: Local network host discovery

A

Use ARP scan (-PR).